Preview

Detrimental Effects of an Electronic Spillage

Better Essays
Open Document
Open Document
5724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Detrimental Effects of an Electronic Spillage
RUNNING HEAD: Electronic Spillage can be detrimental!

Electronic Spillage
Regina Jones
Professor Scott Bell
Strayer University

Electronic Spillage is defined by the United States (US) Government, as information of higher classification or restrictive in nature such as personal identifiable information that is accidentally or intentionally placed on a network of a lower classification. An Electronic Spillage is something that every computer user must be aware of and know the consequences if they are every faced with this issue. Most people think that it is a simple fix to clean-up an electronic spillage, but those that live in the cyber world of warfare within information systems knows that it is much more complicated than deleting a file from a hard drive, especially if a network is involved, not just a stand-alone, and usually the network is always the case. To execute disposal of classified or personal identifiable information from stored media, whether it is magnetic, files, exchange servers and/or hard-drives from desktops or laptops, it can be very intrusive to a network. It could cost thousands of dollars for a complete clean-up depending on the size of the network. This is why most companies and especially the Military go to great lengths to protect their information systems and networks. Usually outside sources are hired for a minimal fee which could end at a huge cost to conduct the clean-up process. The cost could range from five (5) to fifteen (15) thousand dollars in most cases. Mind blowing isn’t it! But it is true. According to a Wharton-Aerospace Defense (Jan, 2009) report, the Navy pays about five (5) million dollars a year, at eleven thousand eight hundred ($11,800) dollars per spillage to a Texas-based technology service provider to wipe out any traces of classified digital information that wound up on unsecured laptops and other computers. Some would argue that this is overkill claiming that it could be



References: Net History. The beginnings of the Internet. 2004. Retrieved on May 28, 2011 from <http://www.nethistory.info/History%20of%20the%20Internet/beginnings.html> Gregorczy, P Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf> Reference of business McAfee. 2010. Underground Economies. Retrieved on May 28,2011 from <http://www.mcafee.com/us/resources/reports/rp-underground-economies.pdf> West, HR Sensei Enterprises, Inc. n.d. Information Security. Retrieved on May 31, 2011 from <http://www.senseit.com/services/is_ir.asp> Daily Finance IP, Business and Franchising Law. Junen 2010. Retrieved on May 31, 2011 from <http://fabianlegal.info/ipandbusinessblog/?p=18>

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    University of Phoenix. (n.d.). Service Requests Web Links. Academic Materials and Tools. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/cist/libraries/sitemap.htm…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    11. Give a brief outline of the history of the Internet by listing the main developments and the dates of those developments.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On 3 May 2006, a Department of Veterans Affairs (VA) laptop was stolen from a VA data analyst’s home in Montgomery County, Maryland. In addition to the laptop, a personal external hard drive was stolen. The external hard drive contained the personal data (names, social security numbers, dates of birth, disability ratings) for 26.5 million veterans and their spouses. It should be noted that the massive data theft was only one of many that had been discovered over the course of 1.5 years.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    U.S. Dept of Homeland Security, U.S. Secret Service. (2007). Best Practices for Seizing Electronic Evidence v.3. Retrieved from Foward Edge II: http://www.forwardedge2.com/pdf/bestPractices.pdf…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    losing sensitive items varies from item to item according to its value and importance. There are many other punishments such as life in prison.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sensitive Items

    • 798 Words
    • 4 Pages

    It is very important to secure all your sensitive equipment and items, and maintain accountability. The reason simply is to keep very important high cost…

    • 798 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Bullshit Army Essay

    • 1249 Words
    • 5 Pages

    Operational security is an extremely important part of our everyday lives while in a deployed enviroment. This fact is amplified that much more when the deployment includes being stationed in a country where the enemy could go undetected, as our foes do not wear a uniform. In a war where there is no front, and as part of our out reach with the citizens of the country that we are occupying, it would be incredibily easy for our enimes to merge themselves into our everyday dealings. With that knowledge, it becomes ever more imnportant to maintain a hold of items that could easily be aquired by our foes. These items include papers, documents, unlocked computers, and identification cards. If left unattended or unacounted for, a potential for a security breach is very likely.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    "Texting: Why All the Fuss?" and Alison Stein Wellner in her article, "Lost in Translation."…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sensitive Item Essay

    • 1269 Words
    • 6 Pages

    Sensitive items can be defined but not limited to Identification card, weapons, Communication Security (COMSEC) filling devises, classified documents, social security numbers, bank account information, etc. Anything that can be used by any opposing forces or criminals, to gain the up hand, counter attack, weaken forces, harm allies, gain access to protected areas, gain vital information, compromise operational security etc. Operational Security is important to maintain at all times. People will tend to get relaxed while not in a combat operation area. This is very dangerous due to the fact that opposing forces and spies know that this happens and are on a constant mission to obtain any ability to gather information or access areas that are normally not available to them. In an article posted by The Washington Post on 26 August 2010; “The most significant breach of U.S. military computers was caused by a flash drive inserted into a laptop on a post in the Middle East in 2008. The article states that a malicious code was placed on the drive by a foreign intelligence agency, there is uploaded it’s self into the military’s computer network. Deputy Defense Secretary William Lynn stated; “The code spread…

    • 1269 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Private Sector Response

    • 551 Words
    • 3 Pages

    Collected information and results will be provided to the government for further investigation. The private sector is in charge of ensuring the security of the networks and areas around the systems where the data breach occurred to manage the situation and prevent any loss of evidences and additional data. While the government investigates and deals with the situation, the private sectors will start cleaning, recovering, and securing the system. They will need to consider all alternatives to replace the compromised resources and machines, correct weaknesses found in the affected systems, and rebuild it to meet the acceptable security level. They should be effectively prepared for future threats and work on eliminating as many vulnerabilities as possible. Formal policies and security tools will also be implemented to protect systems and networks and mitigate the damage of the breach. Lastly, the public and private sectors will be required to complete cybersecurity awareness training for all employee to prevent any phishing…

    • 551 Words
    • 3 Pages
    Good Essays

Related Topics